Video: Every Case Tells a Story| Webinar: ACR/CHEST ILD Guidelines in Practice

An official publication of the ACR and the ARP serving rheumatologists and rheumatology professionals

  • Conditions
    • Axial Spondyloarthritis
    • Gout and Crystalline Arthritis
    • Myositis
    • Osteoarthritis and Bone Disorders
    • Pain Syndromes
    • Pediatric Conditions
    • Psoriatic Arthritis
    • Rheumatoid Arthritis
    • Sjögren’s Disease
    • Systemic Lupus Erythematosus
    • Systemic Sclerosis
    • Vasculitis
    • Other Rheumatic Conditions
  • FocusRheum
    • ANCA-Associated Vasculitis
    • Axial Spondyloarthritis
    • Gout
    • Psoriatic Arthritis
    • Rheumatoid Arthritis
    • Systemic Lupus Erythematosus
  • Guidance
    • Clinical Criteria/Guidelines
    • Ethics
    • Legal Updates
    • Legislation & Advocacy
    • Meeting Reports
      • ACR Convergence
      • Other ACR meetings
      • EULAR/Other
    • Research Rheum
  • Drug Updates
    • Analgesics
    • Biologics/DMARDs
  • Practice Support
    • Billing/Coding
    • EMRs
    • Facility
    • Insurance
    • QA/QI
    • Technology
    • Workforce
  • Opinion
    • Patient Perspective
    • Profiles
    • Rheuminations
      • Video
    • Speak Out Rheum
  • Career
    • ACR ExamRheum
    • Awards
    • Career Development
  • ACR
    • ACR Home
    • ACR Convergence
    • ACR Guidelines
    • Journals
      • ACR Open Rheumatology
      • Arthritis & Rheumatology
      • Arthritis Care & Research
    • From the College
    • Events/CME
    • President’s Perspective
  • Search

HIPAA and PHI Cybersecurity Best Practices in the COVID-19 Era

Steven M. Harris, Esq.  |  Issue: September 2021  |  September 14, 2021

Patient data are being both stored & disseminated through online network channels, email & other telecommunications modes. As a result, access control, encryption & automatic logoff are particularly important.

“Recognized security practices” means standards, guidelines, best practices, methodologies, procedures and processes developed under the National Institute of Standards and Technology (NIST) Act, the Cybersecurity Act of 2015 and other programs, processes or regulations that address cybersecurity now or in the future.

ad goes here:advert-1
ADVERTISEMENT
SCROLL TO CONTINUE

Starting earlier this year, OCR investigators routinely request information regarding a covered entity’s implementation of recognized security practices. Have such practices in place may be key to avoiding hefty fines or penalties in the event of a breach.

2) Adequate Physical Access Protocols & Document Security

Another best practice is to ensure that physical security and document storage policies are up to date. To ensure patient records are physically secure, organizations must ensure their facilities are protected through office and warehouse entry control monitoring systems, cubicle and office security, and electronic device protocols.

ad goes here:advert-2
ADVERTISEMENT
SCROLL TO CONTINUE

Additionally, access validation systems (e.g., identification badges and scanned key cards) provide an additional layer of security to protect facilities from unwanted visitors. In the HHS HIPAA Security Series program on security standards and physical safeguards, a number of best practices are mentioned:1

  • Locked doors, signs warning of restricted areas, surveillance cameras, alarms;
  • Property controls, such as property control tags, engraving on equipment;
  • Personnel controls, such as identification badges, visitor badges and/or escorts for large offices; and
  • Private security service or patrol for the facility.

Although some of the security measures above appear to be standard, such as locked doors, all of the above
are prone to decay and underutilization. The best practice is to ensure that employees are routinely trained on the importance of carrying identification, locking doors and remembering to validate individuals attempting to enter a company’s physical space.

Further, employees may be compelled to cheat some of these safeguards for ease, such as failing to lock documents securely between visits to the file room. The best practice is to enforce physical security measures commensurate with their importance and, as such, implement disciplinary policies in connection to those who fail to adhere to company policies.

Above all else, the COVID-19 era is a time for organizations to retrain employees on the importance of technical and physical security standards and to implement policies if they are inadequate or missing altogether.

Finally, it is important to note that healthcare organizations comprise individuals with disparate training and experience, some of whom do not have technical certifications or expertise in maintaining security and confidentiality of PHI. As a result, it is particularly important for organizations to provide education and continued support. An organization whose employees have an understanding of the types of threats that cybersecurity and physical security protect against will foster an environment of vigilance and bolster its defense.

Page: 1 2 3 4 | Single Page
Share: 

Filed under:Legal Updates Tagged with:HIPAAprotected health information

Related Articles

    Department of Health and Human Services’ Final Rule Expands HIPAA Obligations, Violation Penalties

    April 1, 2013

    Physicians’ business associates can now face civil and criminal penalties for violating HIPAA laws guarding the confidentiality of protected health information

    Email & Text in the World of HIPAA

    May 17, 2019

    The world we live in necessitates infor­mation be communicated in a quick and easy manner. This remains true in the healthcare setting. The ability to text or email staff and patients has become a priority for many healthcare entities. However, maintaining patient privacy and confidentiality is essential to ensure we meet compliance standards. Although emailing…

    LeoWolfert / shutterstock.com

    Legal Updates: Tips for Protecting Your Patients’ Health Information

    December 18, 2019

    In the daily shuffle of evaluating patients and focusing on the delivery of high-quality patient care, the importance of protecting patient information may get overlooked. Human error is just one possible way patient information can be compromised. Cybersecurity attacks are becoming more numerous and sophisticated every day, with the number of patient records compromised increasing….

    HIPAA Security Standards: What Rheumatologists Need to Know

    April 1, 2015

    Maintain compliance with updated federal rules governing privacy protection for patient health information

  • About Us
  • Meet the Editors
  • Issue Archives
  • Contribute
  • Advertise
  • Contact Us
  • Copyright © 2025 by John Wiley & Sons, Inc. All rights reserved, including rights for text and data mining and training of artificial technologies or similar technologies. ISSN 1931-3268 (print). ISSN 1931-3209 (online).
  • DEI Statement
  • Privacy Policy
  • Terms of Use
  • Cookie Preferences